What We Do
Enterprise Services and Cloud
- Network Engineering
- Database Administration
- Infrastructure Engineering and Encrypted Communication
- Network Optimization and Virtualization
- Network Operations Center Support (NOC)
- Capacity Planning and Threshold Monitoring
- Backup and Disaster Recovery Support
- Patch and Software Upgrade Management
- Incident Response Plan Development
- Risk Management Assessments
- Cloud Strategy Development
- Automation of Network Monitoring and Log Management
- System Administration for Windows and UNIX Systems
- Automated Server and Network Device Management
- Network Management including Installation, Configuration, and Testing for Routers, Switches, Firewalls, and Load Balancers
- Inventory and Asset Management
- Identity Management
- Wiring and Equipment Installation
- Virtual Desktop Infrastructure (VDI)
- Identity, Credential and Access Management (ICAM)
- Software-Defined Networking
- Secure Cloud Network(SCN)
IT Operations
- ITIL/ITSM framework
- Multi-sourcing Service Integration (MSI) / Service Integration and Management (SIAM) support
- Service Portfolio Management, including Service Design and Service Catalog Management
- Self-Service Portals with automated Service Requests and self-help Knowledge Bases (KBs)
- Phone, Email, and Live-Chat Customer Service and “touch labor” support
- 24x7 Service Desks with capability of high volume (i.e., 50,000+ calls per month) global user support
- AIOps / Self-healing Systems
- VIP Support
- Virtual Desktop and Thin-Client Support
- Government Owned Contractor Operated (GOCO) and Contractor Owned Contractor Operated (COCO) Service Desks
- Desktop, Laptop, Handheld, and Mobile Support
- Technology Refresh Support Services
- General IT Support, such as Account Access, Network, MS Office, Active Directory, Smartphones and SharePoint
- Mission Critical Applications Support, such as Databases, Case Management Systems, Financial Systems and Medical Systems
- Video Telecommunications (VTC) Support
- Knowledge Base Development and Maintenance
- Service Request development and management, including orchestration to automate repetitive requests such as password re-sets and software installs
- Hardware and Software Management
- Radio-Frequency Identification (RFID) Implementations
- Application Monitoring and Performance / System Metrics Services
- Mobile Device Management
- ServiceNow and Remedy ITSM
- Software and Hardware Asset Management (SAM/HAM)
Cybersecurity
- Security Operations Center (SOC)
- NIST Risk Management Framework (RMF) Assessments and Authorizations
- Federal Information Security Management Act (FISMA) Compliance
- DISA STIG Enforcement
- System/Network Compliance Monitoring/Scanning for Availability, Reliability, and Integrity
- Incident, Threat, and Vulnerability Analysis
- Firewall Management
- IDS/IPS Support
- Virus, Malware, and Security Risk Remediation
- Federal IT Security & Compliance, including DODM 8140.03 Cybersecurity Workforce Certifications
- Assured Compliance Assessment Solution (ACAS)
- Security Content Automation Protocol (SCAP)
- Trellix Host Based Security System (HBSS)
- Enterprise Mission Assurance Support Services (eMASS)
- Zero Trust Security
- Zero Trust Architectures (ZTA)
System Development and Sustainment
- Agile Software Development
- DevSecOps
- Continuous Integration / Continuous Delivery (CI/CD)
- Software Test Automation
- Code Quality Evaluation
- Workflow Automation
- Case Management
- Low Code/No Code Development
- Mobile Applications
- Cybersecurity Compliance
- API Management